Course description
Our boot camp offers comprehensive coverage of the CISM exam domains, including risk management, information security governance, and incident management, all delivered through hands-on, real-world scenarios. Led by experienced instructors who hold the CISM certification, the program includes official ISACA courseware, practice exams, and access to exclusive resources.
Training Camp’s accelerated format is designed to optimize learning efficiency, enabling professionals to achieve certification in less time than traditional programs. We provide personalized support throughout the course to ensure each participant is fully prepared to pass the exam and advance their career. With our proven track record in IT security training and strong partnership with ISACA, Training Camp is the preferred choice for professionals seeking to earn the CISM certification.
Upcoming start dates
Who should attend?
Who should attend this CISM boot camp?
- Information security managers
- IT consultants and professionals aspiring to become information security managers
- Security auditors
- Risk management professionals
- Individuals who are responsible for managing an organization’s information security program
Candidates should have at least five years of professional experience in information security management. However, certain certifications and degrees can substitute up to two years of this required experience. Examples include:
- One year of experience for holding a CISA, CISSP, or other approved certification
- One year for a degree in information security or a related field
Training content
Day 0 – Preparation Prior to Class
Our ISACA CISM Training Camp is designed for busy IT and security professionals, with no mandatory self-study required. However, if you want to enter class with some pre-study under your belt, focusing on the following areas could be beneficial:
- Information Security Governance: Understanding the development and management of security strategies aligned with business objectives and regulatory requirements.
- Risk Management: Familiarize yourself with the process of identifying, assessing, and mitigating security risks in an enterprise environment.
- Information Security Program Development: Basics of designing and managing a security program, including policy development and resource management.
- Incident Management: Strategies for planning, detecting, responding to, and recovering from security incidents.
- Security Controls and Compliance: Overview of key security frameworks, standards, and compliance requirements, including ISO, NIST, and other relevant guidelines.
Module 1: Information Security Governance
- Overview and Objectives:
- Importance of governance in managing enterprise security.
- Aligning information security strategy with organizational goals.
- Key Topics:
- Establishing and maintaining an information security governance framework.
- Integrating information security into enterprise governance.
- Developing information security policies, procedures, and standards.
- Metrics and reporting for information security governance.
- Practical Exercises:
- Case studies on developing governance frameworks.
- Creating and reviewing sample security policies and procedures.
- Practice Questions and Review
Module 2: Information Risk Management
- Overview and Objectives:
- Identifying and managing information security risks in alignment with organizational goals.
- Key Topics:
- Identifying, assessing, and evaluating risks.
- Risk treatment strategies: avoidance, mitigation, acceptance, and transfer.
- Communicating risk to stakeholders.
- Developing and maintaining a risk management program.
- Practical Exercises:
- Conducting risk assessments and risk analysis.
- Risk treatment planning and reporting exercises.
- Practice Questions and Review
Module 3: Information Security Program Development and Management
- Overview and Objectives:
- Designing and implementing an information security program aligned with organizational objectives.
- Key Topics:
- Establishing and maintaining the information security program.
- Aligning the program with business strategy, legal requirements, and industry standards.
- Security awareness and training.
- Resource management and defining roles and responsibilities.
- Practical Exercises:
- Building an information security roadmap.
- Developing security awareness training modules.
- Practice Questions and Review
Module 4: Information Security Incident Management
- Overview and Objectives:
- Establishing and maintaining an effective information security incident management program.
- Key Topics:
- Planning and preparing for incident response.
- Detecting, responding to, and recovering from security incidents.
- Developing and implementing an incident management process.
- Communication strategies and lessons learned from incidents.
- Practical Exercises:
- Incident response simulation exercises.
- Post-incident analysis and reporting.
- Practice Questions and Review
Contact this provider
Training Camp
Training Camp is a leading provider of accelerated certification boot camps, known for our 25+ year partnership with ISC2 and our expertise in preparing professionals for the CISSP certification. Specializing in delivering immersive, hands-on training, we focus on quickly equipping...